An administrator wants to install a patch to an application.

SIMULATIONAn administrator wants to install a patch to an application. Given the scenario, download, verify and install thepatch in the most secure manner.Instructions: The last install that is completed will be the final submission. Answer: See the explanation Explanation:In this case the second link should be used (This may vary in actual exam). The first […]

Read More

please modify the DST port, Protocol, Action, and/or Rule Order

SIMULATIONCompliance with company policy requires a quarterly review of firewall rules. A new administrator is asked toconduct this review on the internal firewall sitting between several Internal networks. The intent of this firewall isto make traffic more restrictive. Given the following information answer the questions below:User Subnet: 192.168.1.0/24 Server Subnet: 192.168.2.0/24 Finance Subnet:192.168.3.0/24Instructions: To perform […]

Read More

Modify the network diagram to prevent SQL injections, XSS attacks, smurf attacks, e-mail spam, downloaded malware, viruses

DRAG DROPCompany A has experienced external attacks on their network and wants to minimize the attacks fromreoccurring. Modify the network diagram to prevent SQL injections, XSS attacks, smurf attacks, e-mail spam,downloaded malware, viruses and ping attacks. The company can spend a MAXIMUM of $50,000 USD. A costlist for each item is listed below:1. Anti-Virus Server […]

Read More

drag and drop the appropriate network zone that the user would be accessing and the access mechanism to meet the above

DRAG DROPA manufacturer is planning to build a segregated network. There are requirements to segregate developmentand test infrastructure from production and the need to support multiple entry points into the network dependingon the service being accessed. There are also strict rules in place to only permit user access from within thesame zone. Currently, the following […]

Read More

Drag and drop the BEST security solution to meet the given requirements.

DRAG DROPAn organization is implementing a project to simplify the management of its firewall network flows andimplement security controls. The following requirements exist. Drag and drop the BEST security solution tomeet the given requirements. Options may be used once or not at all. All placeholders must be filled.Select and Place: Answer: Show Answer

Read More

which of the following type of calculations is needed?

A well-known retailer has experienced a massive credit card breach. The retailer had gone through an auditand had been presented with a potential problem on their network. Vendors were authenticating directly to theretailer’s AD servers, and an improper firewall rule allowed pivoting from the AD server to the DMZ where creditcard servers were kept. The […]

Read More

Which of the following selections represent the BEST option for the CIO?

A company Chief Information Officer (CIO) is unsure which set of standards should govern the company’s ITpolicy. The CIO has hired consultants to develop use cases to test against various government and industrysecurity standards. The CIO is convinced that there is large overlap between the configuration checks andsecurity controls governing each set of standards. Which […]

Read More